{"id":"https://openalex.org/W7152399485","doi":"https://doi.org/10.1109/icecet63943.2025.11472601","title":"A Novel Steganographic Framework Using Spiral Path Traversal and Data Compression Techniques","display_name":"A Novel Steganographic Framework Using Spiral Path Traversal and Data Compression Techniques","publication_year":2025,"publication_date":"2025-07-03","ids":{"openalex":"https://openalex.org/W7152399485","doi":"https://doi.org/10.1109/icecet63943.2025.11472601"},"language":null,"primary_location":{"id":"doi:10.1109/icecet63943.2025.11472601","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11472601","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5133302294","display_name":"Elda Cina","orcid":null},"institutions":[{"id":"https://openalex.org/I2803079837","display_name":"American University of the Middle East","ror":"https://ror.org/02gqgne03","country_code":"KW","type":"education","lineage":["https://openalex.org/I2803079837"]}],"countries":["KW"],"is_corresponding":true,"raw_author_name":"Elda Cina","raw_affiliation_strings":["American University of the Middle East,College of Engineering and Technology,Egaila,Kuwait,54200"],"affiliations":[{"raw_affiliation_string":"American University of the Middle East,College of Engineering and Technology,Egaila,Kuwait,54200","institution_ids":["https://openalex.org/I2803079837"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071069214","display_name":"Edmira Xhaferra","orcid":null},"institutions":[{"id":"https://openalex.org/I273442994","display_name":"Aleksand\u00ebr Moisiu University","ror":"https://ror.org/023p15505","country_code":"AL","type":"education","lineage":["https://openalex.org/I273442994"]}],"countries":["AL"],"is_corresponding":false,"raw_author_name":"Edmira Xhaferra","raw_affiliation_strings":["Aleksander Moisiu University of Durres,Faculty of Information Technology,Durres,Albania"],"affiliations":[{"raw_affiliation_string":"Aleksander Moisiu University of Durres,Faculty of Information Technology,Durres,Albania","institution_ids":["https://openalex.org/I273442994"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5133302294"],"corresponding_institution_ids":["https://openalex.org/I2803079837"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74840949,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9032999873161316,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9032999873161316,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.022099999710917473,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.00419999985024333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.6067000031471252},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.5081999897956848},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4893999993801117},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.4738999903202057},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.44929999113082886},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.38339999318122864},{"id":"https://openalex.org/keywords/spiral","display_name":"Spiral (railway)","score":0.3310000002384186}],"concepts":[{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.6067000031471252},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6037999987602234},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.5081999897956848},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4893999993801117},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.4738999903202057},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.44929999113082886},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4228000044822693},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4203000068664551},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.41530001163482666},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.38339999318122864},{"id":"https://openalex.org/C174128100","wikidata":"https://www.wikidata.org/wiki/Q846907","display_name":"Spiral (railway)","level":2,"score":0.3310000002384186},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.30709999799728394},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2921999990940094},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.2865999937057495},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2793999910354614},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.2732999920845032},{"id":"https://openalex.org/C96333769","wikidata":"https://www.wikidata.org/wiki/Q907955","display_name":"Graph traversal","level":3,"score":0.2542000114917755},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icecet63943.2025.11472601","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11472601","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1703761565","https://openalex.org/W2028197392","https://openalex.org/W2031614119","https://openalex.org/W2060108852","https://openalex.org/W2107927941","https://openalex.org/W2543306304","https://openalex.org/W2732542196","https://openalex.org/W3154278052","https://openalex.org/W3159215692","https://openalex.org/W4308869604","https://openalex.org/W4394016071","https://openalex.org/W4404511022","https://openalex.org/W4407275474"],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1,48,103],"paper,":[2],"we":[3],"propose":[4],"a":[5,55,84],"novel":[6],"approach":[7],"to":[8,16,40,154],"image":[9,59,76,126,162,183],"steganography":[10],"that":[11,90,120],"leverages":[12],"spiral":[13,56,70],"path":[14,57,71],"traversal":[15,89,104],"enhance":[17],"data":[18,31,79],"hiding":[19],"efficiency":[20],"and":[21,42,65,86,95,145,181],"imperceptibility.":[22],"Traditional":[23],"Least":[24],"Significant":[25],"Bit":[26],"(LSB)":[27],"techniques":[28],"embed":[29],"secret":[30,52],"in":[32,176],"linear":[33],"pixel":[34,88],"order,":[35],"often":[36],"making":[37],"patterns":[38],"vulnerable":[39],"statistical":[41],"visual":[43],"detection.":[44],"Our":[45],"method":[46,123,159,171],"disrupts":[47],"regularity":[49],"by":[50],"encoding":[51,96],"information":[53],"along":[54],"within":[58],"blocks,":[60],"distributing":[61],"changes":[62],"more":[63],"uniformly":[64],"reducing":[66],"local":[67],"anomalies.":[68],"The":[69,169],"technique,":[72],"originally":[73],"explored":[74],"for":[75,101,174],"compression":[77],"through":[78],"representation":[80],"using":[81],"combinations,":[82],"enables":[83],"structured":[85],"predictable":[87],"improves":[91],"both":[92],"spatial":[93],"uniformity":[94],"precision.":[97],"While":[98],"primarily":[99],"applied":[100],"compression,":[102],"model":[105],"also":[106],"supports":[107],"robust":[108],"steganographic":[109],"embedding":[110,129],"with":[111,139,164],"minimal":[112],"distortion.":[113],"Experimental":[114],"evaluation":[115],"on":[116],"standard":[117],"datasets":[118],"shows":[119],"the":[121,134],"proposed":[122,170],"maintains":[124,160],"high":[125],"quality;":[127],"when":[128],"1":[130],"bit":[131],"per":[132,157],"block,":[133],"technique":[135],"achieves":[136],"exceptional":[137],"imperceptibility,":[138],"PSNR":[140,165],"values":[141],"exceeding":[142],"69":[143],"dB":[144],"SSIM":[146],"scores":[147],"approaching":[148],"100%.":[149],"Even":[150],"at":[151],"higher":[152],"payloads\u2014up":[153],"3":[155],"bits":[156],"byte\u2014the":[158],"acceptable":[161],"quality,":[163],"above":[166],"37":[167],"dB.":[168],"is":[172],"well-suited":[173],"applications":[175],"secure":[177],"communication,":[178],"digital":[179],"watermarking,":[180],"medical":[182],"authentication.":[184]},"counts_by_year":[],"updated_date":"2026-04-11T06:13:24.991567","created_date":"2026-04-10T00:00:00"}
